2 - Law in Cyberspace | |
An Overview of the Evolving Law Related to Computer Network Defense | An Overview of the Evolving Law Related to Computer Network Defense |
Best Practices for Seizing Electronic Evidence (U.S. Secret Service) | www.treas.gov |
CNSS Instruction No. 4009 | National Information Assurance (IA) Glossary |
Computer Crimes Laws by States | nsi.org |
Computer Fraud and Abuse Act, 18 USC § 1030 | www.usdoj.gov |
Current federal and DoD policy and guidance relating to information assurance | iase.disa.mil |
Cybercrime for Lawyers (U.S. Department of Justice) | www.usdoj.gov |
Cybercrime Topic Area (Federal Legal Information Through Electronics) | www.au.af.mil |
Department of Justice (2002). | Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations |
FindLaw's Cyberspace Law Topic Area | www.findlaw.com |
Joint Task Force-Computer Network Operations (JTF-CNO), Law Enforcement & Counterintelligence Center (LECIC) | www.cert.mil |
Kiser, C. M., FBI SSA, Executive Producer. (1999). | Solar Sunrise: Dawn of a New Threat [video]. National Counterintelligence Center and FBI National Infrastructure Protection Center; Northlight Productions, Inc. |
Uniform Code of Military Justice Articles 92, 133 and 134 | www.au.af.mil |
USA PATRIOT Act (Changes only) | www.usdoj.gov |
USA PATRIOT Act (Full Text - 32 pages) | frwebgate.access.gpo.gov |